Google CTF is the public repository that houses most of the challenges from Google’s Capture-the-Flag competitions since 2017 and the infrastructure used to run them. It’s a learning and practice archive: competitors and educators can replay tasks across categories like pwn, reversing, crypto, web, sandboxing, and forensics. The code and binaries intentionally contain vulnerabilities—by design—so users can explore exploit chains and patching in realistic settings. The repo also includes infrastructure components and links to a scoreboard implementation, giving organizers reference material for hosting their own events. As a living archive, it documents changes in exploitation trends and defensive techniques year over year. Clear warnings advise against deploying challenge infrastructure in production due to purposeful insecurities.
Features
- Year-over-year archive of real CTF challenges and solutions
- Categories spanning pwn, reversing, crypto, web, and forensics
- Purposefully vulnerable binaries and services for hands-on learning
- Reference infrastructure and links to scoreboard tooling
- Educational resource for classes, clubs, and practice teams
- Historical record of exploit techniques and defenses in the wild